Lab 03 - Use Case Diagrams & Use Case Narratives - Student Answers

docx

School

Purdue University *

*We aren’t endorsed by this school

Course

18000

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by AmbassadorGoosePerson253

Report
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives EXERCISES Complete the exercises assigned by your instructor by drawing the assigned models. Save each diagram. Copy and paste each diagram into Lab 03 – Use Case Diagrams & Use Case Narratives – Student Answers. Save that document to your home directory. Close that document. Attach Lab 03 – Use Case Diagrams & Use Case Narratives – Student Answers to the Lab 03 Assignment in Brightspace and submit. 1. Using the context model diagram KEY from Lab 2 for the Northwind Information System (#1), create a use case diagram. Answer:
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives 2. Using the context model diagram KEY from Lab 2 for the student scheduling system (#2), create a use case diagram. Answer:
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives 5. Using the context model diagram for the Pixton Library Resource Inventory and Patron Check-Out System shown below, create a use case diagram. Using the Answer:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives 6. Given the narrative below, prepare a use case narrative. Security; to gain access to the system a User must first request to login to the system and then supply login credentials (user id, password). Once they are authenticated they must then successfully answer 1 of 5 random questions which user has already supplied answers for during the registration process. A user must register with the above information before they are allowed to login. For successful access, the system will provide a confirmation to the user. If unsuccessful an error message will be provided. The system allows three unsuccessful attempts before locking the account (for credentials and question). If the password is 60 days or older the system requires the user to change their password and then forces them to login again. Note: the user will receive a confirmation once their password has been changed successfully. Answer: System Name Author: _Jing E, Gan_ Date: _1/28/2024_ Use-Case Name: Gain access to the System Use Case Type Business Requirements: System Analysis: System Design: Use-Case ID: Lab 3 – Problem 6 Priority: Normal Source: Lab Manual Primary Business Actor: System User Primary System Actor: System Other Participating Actors: - Other Interested Stockholders: System Administrators Description: The use case describes the process of a user trying to gain access to the system Precondition: The user has a registered account Trigger: The user requests to access the system Typical Course Of Events: Actor Action System Response Step 1: The user request to login to the system Step 2: The user provides login credentials Step 3: The system authenticates the user’s login credentials and make sure the user exists Step 4: The system prompts 1 of 5 random questions which the user has already supplied during the registration process to the user Step 5: The user answers the question Step 6: The system verifies the answer to make sure it is correct Step 7: The system provides a confirmation to the user for successful login Alternate Courses: ALT-Step 2: The user cannot provide login credentials. Cancel transaction and notify user ALT-Step 3A: If the user does not exist, cancel transaction and notify user. ALT-Step 3B: If the login credentials are incorrect, notify user and go to STEP 2 ALT-Step 3C: If the login credentials are incorrect and maximum unsuccessful attempts reached, cancel transaction and lock the account. ALT-Step 3D: If the password is 60 days or older, request user to change password, then provide confirmation to user after password has been changed ALT-Step 5: The user cannot provide the answer to the question, cancel transaction and
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives notify user ALT-Step 6A: If the answer provided is incorrect, notify user and go to STEP 4 ALT-Step 6B: If the answer provided is incorrect and maximum unsuccessful attempts have been reached, cancel the transaction and lock the account. Conclusion: The use case concludes when the user successfully log into the system. Postcondition: The system was logged into Business Rules: 1. The user provides their login credentials. 2. The user provides answers to the security questions. 3. The user cannot exceed the unsuccessful login attempts Implementation Constraints and Specifications: Assumptions: Open Issues: 8. Given the narrative below, prepare a use case narrative. The event is initiated when the employee requests to checkout a piece of equipment. They are prompted for their Employee ID and the system confirms that the employee is authorized to check out equipment. If the employee is authorized, then for each requested piece of equipment, the system checks the equipment restrictions to confirm that the employee has been assigned an acceptable skill classification. If the request is for tracked equipment, the system can also check availability by making sure the equipment does not have an outstanding check-out. If the employee is authorized and the equipment available and not restricted from use by that employee, record the check-out. The system provides the employee with a receipt that details the check-out and the location of the equipment. Answer: System Name Author: _Jing E, Gan Date: _1/28/2024 _ Use-Case Name: Checkout equipment Use Case Type Business Requirements: System Analysis: System Design: Use-Case ID: Lab 3 – Problem 8 Priority: Normal Source: Lab Manual Primary Business Actor: Employee Primary System Actor: System Other Participating Actors: - Other Interested Stockholders: Manager Description: This use case describes the process of an employee requesting to checkout a piece of equipment Precondition: The employee has their ID Trigger: The employee requests to check out an piece of equipment Typical Course Of Events: Actor Action System Response
CNIT 180 Lab 3: Use Cases Diagrams & Use Case Narratives Step 1: The employee requests to check out a piece of equipment. Step 2: The system prompts the employee for their Employee ID. Step 3: The employee provides their employee ID Step 4: The system verifies the employee is authorized to check out the equipment Step 5: The system checks the equipment restrictions to confirm that the employee has been assigned an acceptable skill classification Step 6: The system checks the availability of the equipment Step 7: The system authorizes the checkout Step 8: The system records the checkout Step 9: The system provides the employee with a receipt Alternate Courses: ALT-Step 3: The employee is unable to provide their employee ID, cancel the transaction and notify employee ALT-Step 4A: The system determines the employee does not exist, notify employee and go to STEP 2 ALT-Step 4B: The system determines the employee is not authorized to check out the equipment, notifies employee and go to STEP 2 ALT-Step 5: The system determines the employee does not have the required skills to operate the equipment, cancel the transaction and notify the employee ALT-Step 6A: If the equipment is a tracked equipment, make sure that the equipment does not have an outstanding checkout. ALT-Step 6B: If the equipment is not available, notify employee and cancel the transaction. Conclusion: The use case concludes when the employee checks out an equipment Postcondition: The equipment has been checked out Business Rules: 1. The employee must have an eligible ID 2. The employee must be authorized to check out the equipment 3. The employee must have an acceptable skill classification 4. The equipment must be available Implementation Constraints and Specifications: Assumptions: Open Issues:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help